Analysis

  • max time kernel
    143s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/06/2023, 10:04

General

  • Target

    Enclosed (SOA).exe

  • Size

    875KB

  • MD5

    ac256a867183ec9f1a370bc41b58015d

  • SHA1

    aaf4813c5870ff0882a4453904f8533db69bea75

  • SHA256

    13c73dff53867a75126ec548cad96b47a82f412dfc347b7b68c97fbbdb33d818

  • SHA512

    b09f63e657ca5ed04724cfe36e83cc62952e3dbdeb929f9e4ac3e9167573fa569a561a0cd2c3575c2f77349ea793c808acbd61f941bf7e6e8dd512f0f46cb760

  • SSDEEP

    24576:B1gG1tCueiqrBvclUBhDrznW8OAqZDag49G6D3f8+8/Wi0:vgqtCDiqrhhznHWZODI6D3U+bi0

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Enclosed (SOA).exe
    "C:\Users\Admin\AppData\Local\Temp\Enclosed (SOA).exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qWqppDN.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1080
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qWqppDN" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCB2.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4136
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1eye4azi.ozv.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmpCB2.tmp

    Filesize

    1KB

    MD5

    7db3551ceabcb23c5b37b392628bc00a

    SHA1

    3d3a0692e275020e604a1333b58861a82913bcdc

    SHA256

    b6f96d0f42fbf64f73fc6a42f524b7e69bff8cc3d92710ddb8098de304558656

    SHA512

    030079e266e2e9224c4c45e09ba36712d4fd9ec50115f5f5936679f2a27b258bd0ecbd7b3544e6e8f8e038cd1b5232d7e4b68204aa419647d639d2470ca50dec

  • memory/1080-179-0x0000000007630000-0x0000000007CAA000-memory.dmp

    Filesize

    6.5MB

  • memory/1080-168-0x00000000719A0000-0x00000000719EC000-memory.dmp

    Filesize

    304KB

  • memory/1080-185-0x0000000007310000-0x0000000007318000-memory.dmp

    Filesize

    32KB

  • memory/1080-184-0x0000000007330000-0x000000000734A000-memory.dmp

    Filesize

    104KB

  • memory/1080-143-0x00000000023E0000-0x0000000002416000-memory.dmp

    Filesize

    216KB

  • memory/1080-183-0x0000000007220000-0x000000000722E000-memory.dmp

    Filesize

    56KB

  • memory/1080-145-0x0000000004FA0000-0x00000000055C8000-memory.dmp

    Filesize

    6.2MB

  • memory/1080-182-0x0000000007270000-0x0000000007306000-memory.dmp

    Filesize

    600KB

  • memory/1080-147-0x0000000004DA0000-0x0000000004DC2000-memory.dmp

    Filesize

    136KB

  • memory/1080-154-0x0000000005640000-0x00000000056A6000-memory.dmp

    Filesize

    408KB

  • memory/1080-155-0x00000000056B0000-0x0000000005716000-memory.dmp

    Filesize

    408KB

  • memory/1080-181-0x0000000007060000-0x000000000706A000-memory.dmp

    Filesize

    40KB

  • memory/1080-160-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/1080-161-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/1080-180-0x0000000006FF0000-0x000000000700A000-memory.dmp

    Filesize

    104KB

  • memory/1080-178-0x00000000062A0000-0x00000000062BE000-memory.dmp

    Filesize

    120KB

  • memory/1080-163-0x0000000005CE0000-0x0000000005CFE000-memory.dmp

    Filesize

    120KB

  • memory/1080-165-0x0000000006CA0000-0x0000000006CD2000-memory.dmp

    Filesize

    200KB

  • memory/1080-166-0x0000000004960000-0x0000000004970000-memory.dmp

    Filesize

    64KB

  • memory/1080-167-0x000000007FB40000-0x000000007FB50000-memory.dmp

    Filesize

    64KB

  • memory/1996-133-0x00000000000B0000-0x0000000000190000-memory.dmp

    Filesize

    896KB

  • memory/1996-136-0x0000000004D60000-0x0000000004DF2000-memory.dmp

    Filesize

    584KB

  • memory/1996-134-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/1996-135-0x0000000005270000-0x0000000005814000-memory.dmp

    Filesize

    5.6MB

  • memory/1996-138-0x0000000005C90000-0x0000000005D2C000-memory.dmp

    Filesize

    624KB

  • memory/1996-137-0x0000000004CB0000-0x0000000004CC0000-memory.dmp

    Filesize

    64KB

  • memory/3452-162-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3452-164-0x0000000001390000-0x00000000016DA000-memory.dmp

    Filesize

    3.3MB

  • memory/3452-146-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/3452-188-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB